• Skip to main content
  • Skip to after header navigation
  • Skip to site footer
The Halal Times

The Halal Times

Global Halal, Islamic Finance News At Your Fingertips

  • Home
  • Regions
    • Latin America
    • North America
    • Europe
    • Africa
    • Central Asia
    • South Asia
    • Australia
  • Marketing
  • Food
  • Fashion
  • Finance
  • Tourism
  • Economy
  • Cosmetics
  • Health
  • Art
  • Halal Shopping

Fintech Firms Suffer a Data Violation Due to a Critical Zoho Flaw

2022-09-27 by Shahar Bano

When a cyberattack occurs on a platform offering services to the fintech business, the data of its end users is compromised. The hackers probably broke in via a hole in the Zoho ManageEngine software.

According to CISA, an Indian firm used ManageEngine software and has a significant remote code execution (RCE) vulnerability that is exploited in the wild.

On June 24th, Zoho released a fix for an issue that has a CVSS score of 9.8.

Attackers might use this flaw in Password Manager Pro, PAM360, and Access Manager Plus to run arbitrary code on vulnerable systems. Password Manager Pro and PAM360 products are vulnerable since “authentication is not necessary to exploit this issue,” Zoho noted in June, advising customers to update immediately.

Be the first to get new Halal products & exclusive brand reviews!


Thank you!

You have successfully joined our subscriber list.

At least 80 million people across the globe use Zoho’s services. This number includes several Fortune 500 firms such as Netflix, Amazon, Fortinet, Facebook, KPMG, Renault, HP, and Tesla.

Due to “active exploitation evidence,” CISA has issued a warning. Cybernews’s research team identified one incident in which malicious actors had likely used the vulnerability to get into a target company.

The Hack

A threat actor breached the BankingLab, a SaaS banking platform for fintech firms, which is now offering unfettered access to the servers and consumers of its clients. BankingLab reportedly used ManageEngine for its network security.

On September 24, a new member on a famous hacker site said, “Recently, we got all server rights of BankingLab and collected all client data. It includes the transaction flow of each customer’s user and identification information.” The SSH key for internal services and other system and server passwords are stored in the PAM360 password management system. I will now provide you access to along with its master key. We ask that you have pleasure in this.

Financial technology firms may rely on BankingLab for a “complete stack of digital banking services,” which includes tools for managing client accounts, processing payments, issuing cards, and dispensing loans and deposits. Vialet, Simplex, Bankera, and Perlas Finance are just a few of its satisfied customers.

From “enterprise concepts to successful licensed financial institutions,” the firm says it can “guide you” with its technology.

Baltic Amber Solutions (BAS), located in Vilnius, Lithuania, is the owner of the BankingLab brand. In 2021, BAS co-founder and CEO Narimantas Bloznelis told a local news source, “We aim to establish a platform answering to all fintech solution demands, and to become a financial services Amazon.”

Investigation of CyberNews

The CyberNews investigation team determined that the threat actor provided a SQL database dump. The master key for the PAM360 password management system hosted on bankinglab.com. “Structured Query Language,” is a language used in programming and data management. Hackers also use this as a backdoor.

PAM (Privileged Access Management) is an enterprise-level password management, authentication, and access control system. BankingLab is finding out to use PAM360 by Zoho ManageEngine, according to our internal research.

Mantas Sasnauskas, head of the CyberNews team said,

“A threat actor or actors demonstrating that they were able to acquire access to the database might have taken over all of the customers’ accounts. They even made their own account to further pivot and wreak havoc on consumers’ credentials.

The threat actor released a 108 Gigabyte (GB) database, which comprises a PostgreSQL dump with a large amount of log data. It also includes other sensitive information, such as email account settings, all user email settings, agent installation and mobile authorization keys, and other sensitive logs.

According to Sasnauskas, “the potential impact could be immense and depends on BankingLab’s response: whether they saw the breach in time, how long threat actors had access to their systems, and whether they have gained access to customer systems as this opens ways for a possible supply-chain attack.”

Feedback

All cyberattacks are more sophisticated. They are not limited to a single susceptible item. The scope and sophistication of the cyberattack were both high. Bloznelis told CyberNews after verifying the hack, “It is apparent that threat actors have been planning for it for a long time and in numerous methods.”

Bloznelis said that he had notified all impacted customers but did not want to discuss the incident further while the inquiry was ongoing. In addition, BankingLab notified the Lithuanian State Data Protection Inspectorate of the breach.

CyberNews has contacted Lithuanian Bank, the government agency responsible for monitoring the concerned fintech firms. It also includes the State Data Protection Inspectorate, and I will update the story once they respond. It also made contact with impacted businesses that seemed to be aware of the security incident.

Customer funds are completely secure. “There’s no need to do anything at this time.” Bloznelis warned that consumers must be on their guard at all times because of the prevalence of hackers in today’s world. Hackers use social engineering and other techniques to get access to users’ accounts and sensitive data.

Last Friday, the event was reported to the Lithuanian Bank. It informed CyberNews that, “to the best of our knowledge,” clients’ funds were secure. The impacted institutions had either resumed normal operations or would do so soon.

The incident was reported to law enforcement and the National Cybersecurity Center.

One of BankingLab’s clients, ConnectPay, has assured its users that their login credentials and identifiers were safe throughout the event. Although “all probable ramifications of the occurrence” were not dismissed until the completion of the inquiry.

It is widely reported that cyberattacks on financial technology are increased. Only last week, another online bank was the target of a hack that exposed some customers’ personal information. ConnectPay has boosted data security and improved cybersecurity in response to the information war. It also increases the number of attacks since the Russian invasion of Ukraine. It plans to continue improving its cybersecurity in the next few years.

Author

  • Shahar Bano
    Shahar Bano

    View all posts

Like this:

Like Loading...

Related

Help Us Empower Muslim Voices!

Every donation, big or small, helps us grow and deliver stories that matter. Click below to support The Halal Times.

Previous Post:To Be Halal CertifiedWhat Does It Mean To Be Halal Certified?
Next Post:What Are the Top 5 Money-Saving Strategies for Muslim Travelers?

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sidebar

  • LinkedIn
  • X
  • Facebook
  • Instagram
The Halal Times

The Halal Times, led by CEO and Editor-in-Chief Hafiz Maqsood Ahmed, is a prominent digital-only media platform publishing news & views about the global Halal, Islamic finance, and other sub-sectors of the global Islamic economy.

  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
  • YouTube

News

  • Home
  • Halal Shopping
  • Food
  • Finance
  • Fashion
  • Tourism
  • Cosmetics
  • Healthcare
  • Marketing
  • Art
  • Events
  • Video

Business

  • Advertise With Us
  • Global Halal Business Directory
  • Book Business Consultation
  • Zakat Calculator
  • Submit News
  • Subscribe

About

  • About
  • Donate
  • Write For Us
  • The HT Style Guide
  • Contact Us

Copyright © 2025 · The Halal Times · All Rights Reserved ·

%d